Chapter 19. Mobile Security for EnterpriseCHAPTER OVERVIEWEnterprise Security RequirementsContent-Based SecurityDevice SecurityLightweight Mobile Cryptography ToolkitsBouncy Castle Lightweight APIThe IAIK ME JCEPhaos Technology Micro Foundation ToolkitNTRU jNeo for Java ToolkitB3 SecurityDevice-Specific APIsStandardization of J2ME Security APIs This is not the first time we discussed security in this book. In Chapter 6, we discussed advanced HTTP techniques, including mobile clients for secure HTTP (HTTPS) and HTTP Basic/Digest Authentication protocols. Although HTTP-based security measures prove sufficient for most of today's Internet commerce applications, future mobile applications demand more flexible, customizable, and better-optimized security schemes. In this chapter, we discuss the security requirements of mobile enterprise applications and how third-party J2ME tools can help developers meet those requirements. |